swMATH9945MaRDI QIDQ21924FDOQ21924
Author name not available (Why is that?)
Official website: http://www.openssl.org/
Source code repository: https://github.com/openssl/openssl
Cited In (92)
- An intrusion tolerant protection scheme of CA private key
- Secure data deduplication with reliable data deletion in cloud
- A logical characterisation of static equivalence
- GPU-Acceleration of Block Ciphers in the OpenSSL Cryptographic Library
- On the performance of one perspective LSX-based block cipher
- New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures
- Scalar multiplication in elliptic curve libraries
- Accelerating the AES encryption function in openSSL for embedded systems
- An End-to-End Systems Approach to Elliptic Curve Cryptography
- The design and implementation of protocol-based hidden key recovery
- A Secure and Efficient Implementation of the Quotient Digital Signature Algorithm (qDSA)
- Analysis and Optimization of Cryptographically Generated Addresses
- A Timing-Resistant Elliptic Curve Backdoor in RSA
- Speeding-up verification of digital signatures
- Attacking AES using Bernstein's attack on modern processors
- Efficient cache attacks on AES, and countermeasures
- Predicting Secret Keys Via Branch Prediction
- Extended Hidden Number Problem and Its Cryptanalytic Applications
- Cache-timing template attacks
- Fast cryptography in genus 2
- Improving timing attack on RSA-CRT via error detection and correction strategy
- The security impact of a new cryptographic library
- TweetNaCl: A Crypto Library in 100 Tweets
- Acoustic cryptanalysis
- Financial cryptography and data security. FC 2011 workshops, RLCPS and WECSR 2011, Rodney Bay, St. Lucia, February 28--March 4, 2011. Revised selected papers
- Session resumption protocols and efficient forward security for TLS 1.3 0-RTT
- Cryptanalysis of GOST in the multiple-key scenario
- Software implementation of modular exponentiation, using advanced vector instructions architectures
- Fast implementation of Curve25519 using AVX2
- Montgomery multiplication using vector instructions
- High-performance implementation of elliptic curve cryptography using vector instructions
- Off-Line/On-Line Signatures: Theoretical Aspects and Experimental Results
- Integrated Formal Methods
- Verification, Model Checking, and Abstract Interpretation
- Software optimizations for cryptographic primitives on general purpose x86\_64 platforms
- Verifiable side-channel security of cryptographic implementations: constant-time MEE-CBC
- Aggregated differentials and cryptanalysis of PP-1 and GOST
- Secure electronic bills of lading: Blind counts and digital signatures
- Topics in cryptology -- CT-RSA 2008. The cryptographers' track at the RSA conference 2008, San Francisco, CA, USA, April 8--11, 2008. Proceedings
- Speculative dereferencing: reviving foreshadow
- Fast elliptic curve cryptography in OpenSSL
- Cryptography and coding. 11th IMA international conference, Cirencester, UK, December 18--20, 2007. Proceedings
- New Results on Instruction Cache Attacks
- LiDIA
- MPIR
- MIRACL
- eBASH
- A Vulnerability in RSA Implementations Due to Instruction Cache Analysis and Its Demonstration on OpenSSL
- GnuPG
- mpFq
- eBACS
- gf2x
- CryptoVerif
- NaCl
- Crypto++
- TweetNaCl
- MAGIC
- Echidna
- McBits
- COBRA
- DNSCurve
- ELmE
- OleF
- POEx
- FleXOR
- libgarble
- s2n
- liboqs
- Curve25519
- mbed TLS
- Lockr
- PassPoints
- WolfSSL
- Sequential aggregate signatures with lazy verification from trapdoor permutations
- Privacy-preserving resource sharing using permissioned blockchains (the case of smart neighbourhood)
- Fast polynomial inversion for post quantum QC-MDPC cryptography
- Libgcrypt
- Backflip
- An Iterative Framework for Simulation Conformance
- libOTe
- The software performance of authenticated-encryption modes
- \textsc{POEx}: a beyond-birthday-bound-secure on-line cipher
- Hashing garbled circuits for free
- LEDAcrypt
- Rowhammer.js
- Key Bit-Dependent Attack on Protected PKC Using a Single Trace
- Practical realisation and elimination of an ECC-related software bug attack
- Sequential aggregate signatures with lazy verification from trapdoor permutations. (Extended abstract)
- Post-quantum key exchange for the Internet and the open quantum safe project
- Security Against Related Randomness Attacks via Reconstructive Extractors
- Topics in Cryptology – CT-RSA 2006
- Implementing GCM on ARMv8
This page was built for software: OpenSSL